Sciweavers

8644 search results - page 18 / 1729
» On the Composition of Secure Systems
Sort
View
CSFW
2005
IEEE
14 years 1 months ago
Enforcing Secure Service Composition
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
ICSE
2009
IEEE-ACM
14 years 2 months ago
Multi-dimensional service compositions
The wide diffusion of reliable Internet is pushing two key novelties in the conception of modern software applications: the Software as a Service paradigm and the idea of the Inte...
Luciano Baresi, Elisabetta Di Nitto, Sam Guinea, S...
ICWS
2008
IEEE
13 years 9 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 4 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
CSFW
1996
IEEE
13 years 11 months ago
A Logic of Composition for Information Flow Predicates
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...